Advertisement

Steganographic Scheme Using a Block Cipher

  • Jeong Jae Yu
  • Chang-ho Jung
  • Seok-Koo Yoon
  • Sangjin Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Abstract

Westfeld[1] detected the stegoed–image by measuring the frequencies of PoVs(pairs of values) in the suspicious images. Fridrich[4] proposed another detection method, so-called RS steganalysis. In this paper we propose a steganographic scheme using a block cipher, which minimizes the embedding changes of a cover object utilizing not only the LSBs of the cover object’s strings but also the whole bits of the cover object. The proposed scheme is a kind of the coding scheme which minimizes changed bits for message embedding without sharing the secret code–book. The experimental result shows that the proposed scheme efficiently evades the χ 2–statistical test and RS steganalysis.

Keywords

Secret Message Block Cipher Cipher Text Cover Object Message Block 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. Information Hiding 21, 61–76 (1999)Google Scholar
  2. 2.
    Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Kahn, D.: The Codebreakers-The Story of Secret Writing. Scribner, New York (1996); Proceedings of CRYPTO 1983, pp. 51–67. Plenum Press, New York (1984) Google Scholar
  4. 4.
    Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale image. Magazine of IEEE Multimedia, 22–28 (2001)Google Scholar
  5. 5.
    Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, pp. 323–335 (2001)Google Scholar
  6. 6.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Jeong Jae Yu
    • 1
  • Chang-ho Jung
    • 1
  • Seok-Koo Yoon
    • 1
  • Sangjin Lee
    • 1
  1. 1.Center for Information Security TechnologiesKorea UniversitySeoulKorea

Personalised recommendations